1. What is “social engineering” in the context of cybersecurity?
Answer: b) Manipulating people to reveal confidential information Explanation: Social engineering exploits human psychology rather than technical vulnerabilities to gain unauthorized access.
2. What is the safest way to verify an email is genuine?
Answer: b) Contact the sender through an official channel Explanation: Verifying through official channels confirms the email’s legitimacy and protects against phishing.
3. What is “identity theft”?
Answer: b) Stealing and using someone’s personal information for fraud Explanation: Identity theft involves using someone’s information for illegal activities, leading to financial and reputational damage.
4. What’s a sign that your device may be infected with malware?
Answer: b) Random pop-ups and unusual activity Explanation: Pop-ups, slow performance, and unexpected behavior are common signs of malware infections.
5. What’s a primary benefit of using end-to-end encrypted messaging apps?
Answer: b) Ensures that only the sender and recipient can read the messages Explanation: End-to-end encryption prevents anyone but the intended recipient from accessing the content.
6. What’s a common sign of a phishing email?
Answer: b) Grammar and spelling errors or urgent requests Explanation: Phishing emails often contain errors or pressure tactics to trick recipients into clicking links or sharing information.
7. Why is it recommended to back up your files regularly?
Answer: b) It protects against data loss in case of ransomware attacks Explanation: Regular backups allow you to recover your data if it’s encrypted or lost in an attack.
8. Which of these is the safest type of password?
Answer: b) A complex combination of letters, numbers, and symbols Explanation: Strong passwords are difficult to guess, reducing the likelihood of unauthorized access.
9. Why is it risky to reuse the same password across multiple accounts?
Answer: b) If one account is compromised, others are at risk Explanation: Reusing passwords makes it easier for attackers to gain access to multiple accounts if they crack one.
10. You receive an email from your bank saying your account is locked, asking you to click a link to reset it. What’s the best first step?
Answer: b) Call your bank using the official number to confirm the email’s authenticity Explanation: Always verify unexpected emails by contacting your bank directly using official contact information. Phishing scams often disguise themselves as trustworthy institutions.